


| #---------------------------------------------------------- | ||
| # Jtrip Configuration File for intrusion detection daemon | ||
| #---------------------------------------------------------- | ||
| # Directives for script are as follows | ||
| # DIR=/bin This tells jtrip to use all members of /bin | ||
| # to include in the database | ||
| # FILE=/bin/rm This tells jtrip to use only this file | ||
| # when creating the database | ||
| # CONF=/etc/host this tells jtrip that this is a config | ||
| # file and may be checked on a different | ||
| # Schedule from other directives this is | ||
| # used to check vendor supplied control | ||
| # files | ||
| #---------------------------------------------------------- | ||
| DIR=/bin | ||
| DIR=/sbin | ||
| DIR=/usr/sbin | ||
| DIR=/usr/local/sbin | ||
| FILE=/etc/hosts.equiv | ||
| CONF=/etc/pam.conf | ||
| ------------------------------------------- | ||
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/605,689US7565690B2 (en) | 2003-08-04 | 2003-10-17 | Intrusion detection |
| PCT/US2004/022743WO2005031499A2 (en) | 2003-08-04 | 2004-07-16 | Host intrusion detection and isolation |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/634,117US20050033976A1 (en) | 2003-08-04 | 2003-08-04 | Host intrusion detection and isolation |
| US10/605,689US7565690B2 (en) | 2003-08-04 | 2003-10-17 | Intrusion detection |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/634,117Continuation-In-PartUS20050033976A1 (en) | 2003-08-04 | 2003-08-04 | Host intrusion detection and isolation |
| Publication Number | Publication Date |
|---|---|
| US20050033984A1true US20050033984A1 (en) | 2005-02-10 |
| US7565690B2 US7565690B2 (en) | 2009-07-21 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/605,689Expired - Fee RelatedUS7565690B2 (en) | 2003-08-04 | 2003-10-17 | Intrusion detection |
| Country | Link |
|---|---|
| US (1) | US7565690B2 (en) |
| WO (1) | WO2005031499A2 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070274230A1 (en)* | 2006-05-23 | 2007-11-29 | Werber Ryan A | System and method for modifying router firmware |
| CN100383750C (en)* | 2006-06-07 | 2008-04-23 | 中国科学院计算技术研究所 | A method for implementing a high-reliability log system for large-scale computing systems |
| US7571485B1 (en)* | 2005-03-30 | 2009-08-04 | Symantec Corporation | Use of database schema for fraud prevention and policy compliance |
| US20140208420A1 (en)* | 2013-01-23 | 2014-07-24 | Owl Computing Technologies, Inc. | System for remotely monitoring status information of devices connected to a network |
| WO2014210246A1 (en)* | 2013-06-28 | 2014-12-31 | Mcafee, Inc. | Rootkit detection by using hardware resources to detect inconsistencies in network traffic |
| CN107517226A (en)* | 2017-09-30 | 2017-12-26 | 北京奇虎科技有限公司 | Alarm method and device based on wireless network intrusion |
| US9877100B1 (en) | 2016-08-29 | 2018-01-23 | Motorola Mobility Llc | Audio sensing to alert device user |
| US11178223B2 (en)* | 2018-11-07 | 2021-11-16 | Phacil, Llc | System and method for non-network dependent cybersecurity |
| US11762992B2 (en) | 2021-09-27 | 2023-09-19 | Hubei University | Intrusion detection method based on improved immune network algorithm, and application thereof |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7975298B1 (en)* | 2006-03-29 | 2011-07-05 | Mcafee, Inc. | System, method and computer program product for remote rootkit detection |
| US9363675B2 (en)* | 2006-06-15 | 2016-06-07 | Cisco Technology, Inc. | Distributed wireless security system |
| US9584587B2 (en)* | 2015-02-03 | 2017-02-28 | Fortinet, Inc. | Managing transmission and storage of sensitive data |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5919257A (en)* | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system |
| US6081894A (en)* | 1997-10-22 | 2000-06-27 | Rvt Technologies, Inc. | Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data |
| US6321338B1 (en)* | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
| US20020032798A1 (en)* | 2000-09-08 | 2002-03-14 | Wei Xu | Systems and methods for packet sequencing |
| US20020069369A1 (en)* | 2000-07-05 | 2002-06-06 | Tremain Geoffrey Donald | Method and apparatus for providing computer services |
| US20020078382A1 (en)* | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
| US20020112185A1 (en)* | 2000-07-10 | 2002-08-15 | Hodges Jeffrey D. | Intrusion threat detection |
| US20020129264A1 (en)* | 2001-01-10 | 2002-09-12 | Rowland Craig H. | Computer security and management system |
| US20020162026A1 (en)* | 2001-02-06 | 2002-10-31 | Michael Neuman | Apparatus and method for providing secure network communication |
| US20030051026A1 (en)* | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
| US20030097431A1 (en)* | 2001-09-29 | 2003-05-22 | Dill Russell J. | Ethernet firewall multi-access appliance |
| US20030101358A1 (en)* | 2001-11-28 | 2003-05-29 | Porras Phillip Andrew | Application-layer anomaly and misuse detection |
| US6584565B1 (en)* | 1997-07-15 | 2003-06-24 | Hewlett-Packard Development Company, L.P. | Method and apparatus for long term verification of digital signatures |
| US20030120935A1 (en)* | 2001-12-20 | 2003-06-26 | Coretrace Corporation | Kernel-based network security infrastructure |
| US20030154399A1 (en)* | 2002-02-08 | 2003-08-14 | Nir Zuk | Multi-method gateway-based network security systems and methods |
| US20030159070A1 (en)* | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| US20030163704A1 (en)* | 2002-02-25 | 2003-08-28 | Dick Kevin Stewart | System, method and computer program product for guaranteeing electronic transactions |
| US20030182580A1 (en)* | 2001-05-04 | 2003-09-25 | Lee Jai-Hyoung | Network traffic flow control system |
| US20030204728A1 (en)* | 2002-04-30 | 2003-10-30 | Tippingpoint Technologies, Inc. | Steganographically authenticated packet traffic |
| US6647400B1 (en)* | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions |
| US20030217289A1 (en)* | 2002-05-17 | 2003-11-20 | Ken Ammon | Method and system for wireless intrusion detection |
| US6654882B1 (en)* | 2002-05-24 | 2003-11-25 | Rackspace, Ltd | Network security system protecting against disclosure of information to unauthorized agents |
| US20040025015A1 (en)* | 2002-01-04 | 2004-02-05 | Internet Security Systems | System and method for the managed security control of processes on a computer system |
| US20040049693A1 (en)* | 2002-09-11 | 2004-03-11 | Enterasys Networks, Inc. | Modular system for detecting, filtering and providing notice about attack events associated with network security |
| US6725377B1 (en)* | 1999-03-12 | 2004-04-20 | Networks Associates Technology, Inc. | Method and system for updating anti-intrusion software |
| US20040078568A1 (en)* | 2002-10-16 | 2004-04-22 | Duc Pham | Secure file system server architecture and methods |
| US6735702B1 (en)* | 1999-08-31 | 2004-05-11 | Intel Corporation | Method and system for diagnosing network intrusion |
| US6775657B1 (en)* | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method |
| US20050039047A1 (en)* | 2003-07-24 | 2005-02-17 | Amit Raikar | Method for configuring a network intrusion detection system |
| US6961763B1 (en)* | 1999-08-17 | 2005-11-01 | Microsoft Corporation | Automation system for controlling and monitoring devices and sensors |
| US20050262343A1 (en)* | 2003-05-02 | 2005-11-24 | Jorgensen Jimi T | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
| US7117504B2 (en)* | 2001-07-10 | 2006-10-03 | Microsoft Corporation | Application program interface that enables communication for a network software platform |
| US7124438B2 (en)* | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
| US7133729B1 (en)* | 1999-08-17 | 2006-11-07 | Microsoft Corporation | Pattern-and model-based power line monitoring |
| US7140041B2 (en)* | 2002-04-11 | 2006-11-21 | International Business Machines Corporation | Detecting dissemination of malicious programs |
| US7155745B1 (en)* | 1999-10-15 | 2006-12-26 | Fuji Xerox Co., Ltd. | Data storage device provided with function for user's access right |
| US7194623B1 (en)* | 1999-05-28 | 2007-03-20 | Hewlett-Packard Development Company, L.P. | Data event logging in computing platform |
| US7213260B2 (en)* | 2002-03-08 | 2007-05-01 | Secure Computing Corporation | Systems and methods for upstream threat pushback |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5923884A (en) | 1996-08-30 | 1999-07-13 | Gemplus S.C.A. | System and method for loading applications onto a smart card |
| US7096497B2 (en) | 2001-03-30 | 2006-08-22 | Intel Corporation | File checking using remote signing authority via a network |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6584565B1 (en)* | 1997-07-15 | 2003-06-24 | Hewlett-Packard Development Company, L.P. | Method and apparatus for long term verification of digital signatures |
| US5919257A (en)* | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system |
| US6081894A (en)* | 1997-10-22 | 2000-06-27 | Rvt Technologies, Inc. | Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data |
| US6321338B1 (en)* | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
| US6725377B1 (en)* | 1999-03-12 | 2004-04-20 | Networks Associates Technology, Inc. | Method and system for updating anti-intrusion software |
| US7194623B1 (en)* | 1999-05-28 | 2007-03-20 | Hewlett-Packard Development Company, L.P. | Data event logging in computing platform |
| US7133729B1 (en)* | 1999-08-17 | 2006-11-07 | Microsoft Corporation | Pattern-and model-based power line monitoring |
| US6961763B1 (en)* | 1999-08-17 | 2005-11-01 | Microsoft Corporation | Automation system for controlling and monitoring devices and sensors |
| US6647400B1 (en)* | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions |
| US6735702B1 (en)* | 1999-08-31 | 2004-05-11 | Intel Corporation | Method and system for diagnosing network intrusion |
| US7155745B1 (en)* | 1999-10-15 | 2006-12-26 | Fuji Xerox Co., Ltd. | Data storage device provided with function for user's access right |
| US6775657B1 (en)* | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method |
| US20020069369A1 (en)* | 2000-07-05 | 2002-06-06 | Tremain Geoffrey Donald | Method and apparatus for providing computer services |
| US20020112185A1 (en)* | 2000-07-10 | 2002-08-15 | Hodges Jeffrey D. | Intrusion threat detection |
| US20020032798A1 (en)* | 2000-09-08 | 2002-03-14 | Wei Xu | Systems and methods for packet sequencing |
| US20020078382A1 (en)* | 2000-11-29 | 2002-06-20 | Ali Sheikh | Scalable system for monitoring network system and components and methodology therefore |
| US20020129264A1 (en)* | 2001-01-10 | 2002-09-12 | Rowland Craig H. | Computer security and management system |
| US7058968B2 (en)* | 2001-01-10 | 2006-06-06 | Cisco Technology, Inc. | Computer security and management system |
| US20030051026A1 (en)* | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
| US20020162026A1 (en)* | 2001-02-06 | 2002-10-31 | Michael Neuman | Apparatus and method for providing secure network communication |
| US20030182580A1 (en)* | 2001-05-04 | 2003-09-25 | Lee Jai-Hyoung | Network traffic flow control system |
| US20030159070A1 (en)* | 2001-05-28 | 2003-08-21 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages |
| US7117504B2 (en)* | 2001-07-10 | 2006-10-03 | Microsoft Corporation | Application program interface that enables communication for a network software platform |
| US20030097431A1 (en)* | 2001-09-29 | 2003-05-22 | Dill Russell J. | Ethernet firewall multi-access appliance |
| US20030101358A1 (en)* | 2001-11-28 | 2003-05-29 | Porras Phillip Andrew | Application-layer anomaly and misuse detection |
| US20030120935A1 (en)* | 2001-12-20 | 2003-06-26 | Coretrace Corporation | Kernel-based network security infrastructure |
| US20040025015A1 (en)* | 2002-01-04 | 2004-02-05 | Internet Security Systems | System and method for the managed security control of processes on a computer system |
| US20030154399A1 (en)* | 2002-02-08 | 2003-08-14 | Nir Zuk | Multi-method gateway-based network security systems and methods |
| US20030163704A1 (en)* | 2002-02-25 | 2003-08-28 | Dick Kevin Stewart | System, method and computer program product for guaranteeing electronic transactions |
| US7213260B2 (en)* | 2002-03-08 | 2007-05-01 | Secure Computing Corporation | Systems and methods for upstream threat pushback |
| US7124438B2 (en)* | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
| US7140041B2 (en)* | 2002-04-11 | 2006-11-21 | International Business Machines Corporation | Detecting dissemination of malicious programs |
| US20030204728A1 (en)* | 2002-04-30 | 2003-10-30 | Tippingpoint Technologies, Inc. | Steganographically authenticated packet traffic |
| US20030217289A1 (en)* | 2002-05-17 | 2003-11-20 | Ken Ammon | Method and system for wireless intrusion detection |
| US6654882B1 (en)* | 2002-05-24 | 2003-11-25 | Rackspace, Ltd | Network security system protecting against disclosure of information to unauthorized agents |
| US20040049693A1 (en)* | 2002-09-11 | 2004-03-11 | Enterasys Networks, Inc. | Modular system for detecting, filtering and providing notice about attack events associated with network security |
| US20040078568A1 (en)* | 2002-10-16 | 2004-04-22 | Duc Pham | Secure file system server architecture and methods |
| US20050262343A1 (en)* | 2003-05-02 | 2005-11-24 | Jorgensen Jimi T | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
| US20050039047A1 (en)* | 2003-07-24 | 2005-02-17 | Amit Raikar | Method for configuring a network intrusion detection system |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7571485B1 (en)* | 2005-03-30 | 2009-08-04 | Symantec Corporation | Use of database schema for fraud prevention and policy compliance |
| US20070274230A1 (en)* | 2006-05-23 | 2007-11-29 | Werber Ryan A | System and method for modifying router firmware |
| CN100383750C (en)* | 2006-06-07 | 2008-04-23 | 中国科学院计算技术研究所 | A method for implementing a high-reliability log system for large-scale computing systems |
| US20140208420A1 (en)* | 2013-01-23 | 2014-07-24 | Owl Computing Technologies, Inc. | System for remotely monitoring status information of devices connected to a network |
| US9712543B2 (en)* | 2013-01-23 | 2017-07-18 | Owl Cyber Defense Solutions, LLP | System for remotely monitoring status information of devices connected to a network |
| WO2014210246A1 (en)* | 2013-06-28 | 2014-12-31 | Mcafee, Inc. | Rootkit detection by using hardware resources to detect inconsistencies in network traffic |
| US9877100B1 (en) | 2016-08-29 | 2018-01-23 | Motorola Mobility Llc | Audio sensing to alert device user |
| CN107517226A (en)* | 2017-09-30 | 2017-12-26 | 北京奇虎科技有限公司 | Alarm method and device based on wireless network intrusion |
| CN107517226B (en)* | 2017-09-30 | 2021-03-19 | 北京奇虎科技有限公司 | Alarm method and device based on wireless network intrusion |
| US11178223B2 (en)* | 2018-11-07 | 2021-11-16 | Phacil, Llc | System and method for non-network dependent cybersecurity |
| US11399060B2 (en) | 2018-11-07 | 2022-07-26 | Phacil, Llc | System and method for continuous AI management and learning |
| US11503117B2 (en) | 2018-11-07 | 2022-11-15 | Phacil, Llc | Secure expeditionary AI sense-understand-decide-act system and method |
| US12041126B2 (en) | 2018-11-07 | 2024-07-16 | Phacil, Llc | System and method for non-network dependent cybersecurity |
| US11762992B2 (en) | 2021-09-27 | 2023-09-19 | Hubei University | Intrusion detection method based on improved immune network algorithm, and application thereof |
| Publication number | Publication date |
|---|---|
| US7565690B2 (en) | 2009-07-21 |
| WO2005031499A3 (en) | 2005-06-02 |
| WO2005031499A2 (en) | 2005-04-07 |
| Publication | Publication Date | Title |
|---|---|---|
| EP1860590B1 (en) | Posture-based data protection | |
| CN100425025C (en) | Security system and method for application server security law and network security law | |
| US6298445B1 (en) | Computer security | |
| US7752662B2 (en) | Method and apparatus for high-speed detection and blocking of zero day worm attacks | |
| JP4327698B2 (en) | Network type virus activity detection program, processing method and system | |
| US7793094B2 (en) | HTTP cookie protection by a network security device | |
| US20070294759A1 (en) | Wireless network control and protection system | |
| US20050138402A1 (en) | Methods and apparatus for hierarchical system validation | |
| US20030208694A1 (en) | Network security system and method | |
| US7565690B2 (en) | Intrusion detection | |
| CN109936555A (en) | A data storage method, device and system based on cloud platform | |
| US7594268B1 (en) | Preventing network discovery of a system services configuration | |
| CN118075015A (en) | Terminal protection method and system for electric power information system in network dynamic stealth environment | |
| US20060047826A1 (en) | Client computer self health check | |
| CN116566654A (en) | Protection system for block chain management server | |
| WO1999056196A1 (en) | Computer security | |
| CN111556024B (en) | Reverse access control system and method | |
| Yoon et al. | Security considerations based on classification of IoT device capabilities | |
| US20080022397A1 (en) | Systems and methods for managing network vulnerability | |
| WO2003034687A1 (en) | Method and system for securing computer networks using a dhcp server with firewall technology | |
| JP4408837B2 (en) | Authentication system | |
| US12015719B1 (en) | Apparatus, systems, and methods relying on non-flashable circuitry for improving security on public or private networks | |
| US12088735B1 (en) | Apparatus, systems, and methods relying on non-flashable circuitry for improving security on public or private networks | |
| JP2003167786A (en) | Network monitoring system | |
| WO2022101934A1 (en) | A system to protect data exfilteration through detection and validation and method thereof |
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment | Owner name:SBC KNOWLEDGE VENTURES, L.P., NEVADA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DOHERTY, JAMES M.;ADAMS, THOMAS LEE;MUELLER, STEPHEN MARK;REEL/FRAME:015014/0912 Effective date:20031114 | |
| FEPP | Fee payment procedure | Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY | |
| STCF | Information on status: patent grant | Free format text:PATENTED CASE | |
| FPAY | Fee payment | Year of fee payment:4 | |
| FPAY | Fee payment | Year of fee payment:8 | |
| AS | Assignment | Owner name:AT&T INTELLECTUAL PROPERTY I, L.P., GEORGIA Free format text:CHANGE OF NAME;ASSIGNOR:AT&T KNOWLEDGE VENTURES, L.P.;REEL/FRAME:052045/0279 Effective date:20071001 Owner name:AT&T KNOWLEDGE VENTURES, L.P., NEVADA Free format text:CHANGE OF NAME;ASSIGNOR:SBC KNOWLEDGE VENTURES, L.P.;REEL/FRAME:052045/0263 Effective date:20060224 | |
| FEPP | Fee payment procedure | Free format text:MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY | |
| LAPS | Lapse for failure to pay maintenance fees | Free format text:PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY | |
| STCH | Information on status: patent discontinuation | Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 | |
| FP | Lapsed due to failure to pay maintenance fee | Effective date:20210721 |